Full Paper View Go Back

An Implementation of an Vulnerability Management in Complex Networks and Defining Severity

Rikam Palkar1 , Swati Chopade2

Section:Research Paper, Product Type: Isroset-Journal
Vol.6 , Issue.3 , pp.35-38, Jun-2018


CrossRef-DOI:   https://doi.org/10.26438/ijsrcse/v6i3.3538


Online published on Jun 30, 2018


Copyright © Rikam Palkar, Swati Chopade . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Rikam Palkar, Swati Chopade, “An Implementation of an Vulnerability Management in Complex Networks and Defining Severity,” International Journal of Scientific Research in Computer Science and Engineering, Vol.6, Issue.3, pp.35-38, 2018.

MLA Style Citation: Rikam Palkar, Swati Chopade "An Implementation of an Vulnerability Management in Complex Networks and Defining Severity." International Journal of Scientific Research in Computer Science and Engineering 6.3 (2018): 35-38.

APA Style Citation: Rikam Palkar, Swati Chopade, (2018). An Implementation of an Vulnerability Management in Complex Networks and Defining Severity. International Journal of Scientific Research in Computer Science and Engineering, 6(3), 35-38.

BibTex Style Citation:
@article{Palkar_2018,
author = {Rikam Palkar, Swati Chopade},
title = {An Implementation of an Vulnerability Management in Complex Networks and Defining Severity},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {6 2018},
volume = {6},
Issue = {3},
month = {6},
year = {2018},
issn = {2347-2693},
pages = {35-38},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=646},
doi = {https://doi.org/10.26438/ijcse/v6i3.3538}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i3.3538}
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=646
TI - An Implementation of an Vulnerability Management in Complex Networks and Defining Severity
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Rikam Palkar, Swati Chopade
PY - 2018
DA - 2018/06/30
PB - IJCSE, Indore, INDIA
SP - 35-38
IS - 3
VL - 6
SN - 2347-2693
ER -

534 Views    500 Downloads    123 Downloads
  
  

Abstract :
Complex systems are found in an extensive variety of areas from technological and social to biological environments. In spite of this scope of uses and settings in which complex systems are utilized as models, examines propose that numerous genuine systems are represented by a comparable elements. An important characteristic is that in general such networks are robust against failures but vulnerable against targeted attacks. Impossible to miss trademark: resilience. In this technological era business endeavor to stay aware of evolving technology, it implies that they have a high capacity to absorb changes. However, resilience mechanisms are not present per se in technological networks. Thus, this work presents a framework for vulnerability assessment, vulnerability analysis and vulnerability management in versatile technological networks

Key-Words / Index Term :
Network, VMP

References :
[1] “CWE- Common Weakness Enumeration”,Available: http://nvd.nist.gov/
[2] “NVD Data Feed and Product Integration”, National Vulnerability Database, Available: http://nvd.nist.gov/download.cfm
[3] N. W. Adger,“Vulnerability,” Global Environmental Change, no. 3, pp. 268–281, August.
[4] A. Reka, J. Hawoong, and B. Albert-Laszlo,“Error and attack tolerance of complex networks,” Nature, no. 6794, pp. 378–382, July.
[5] “CVE, Common Vulnerabilities and Exposures.” http://cve.mitre.org/
[6] http://www.metasploit.com/
[7] http://www.tenable.com/products/nessus
[8] M.E.J. Newman "Analysis of weighted networks", The American Physical Society.
[9] “The OVAL Language.” http://oval.mitre.org/ - Open vulnerability and assessment language.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation